Preferred Language
Articles
/
mhYKF4oBVTCNdQwCwpCm
Applying a suitable approximate-simulation technique of an epidemic model with random parameters
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulation methods which are Mean Monte Carlo Finite difference (MMC_FD) and Mean Latin Hypercube Finite difference (MLH_FD), are also used to solve the proposed epidemic model under study. The obtained results are discussed, tabulated, and represented graphically. Finally, the absolute error is the tool used to compare the numerical simulation solutions from 2020 to 2024 years. The behavior of the Coronavirus in Iraq has been expected for 4 years from 2020 to 2024 using the proposed numerical simulation methods.

Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
An Investigation into the Behavior of Disc Blake Wear
...Show More Authors

A real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
مجلة ميسان للدراسات الأكاديمية
An Overview Of The Loquat's "Eriobotrya Japonica" Active Components
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
legitimacy           Revolution of Imam Hussein From an Islamic perspective
...Show More Authors

The sole aim of the tribe of the Messenger of Allah (PBUH) and his basilica was to revoke the Umayyad heresy and to refute the suspicions through which they climbed to the top of the pyramid of power and legitimized the leadership of Muslims (heresy of hereditary rule) with the sword and blood. Therefore, Imam Hussein (peace be upon him) began his Ashura process with his short divine message in its words and great in its vocabulary and content and even the future of Mohammedan Islam over the times and spaces - what we will see in the folds of research, God willing.

View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Deflection Analysis of an Elastic Single Link Robotic Manipulator
...Show More Authors

Abstract

Robotics manipulators with structural flexibility provide an attractive alternative to rigid robotics manipulators for many of the new and evolving applications in robotics. In certain applications their use is unavoidable. The increased complexity in modeling and control of such manipulators is offset by desirable performance enhancements in some respects. In this paperthe single- link flexible robotics manipulator was designed and implemented from Perspex and designed with 0.5 m length , 0.02 m width and with 0.004 m thickness with mass located at the tip. There are four subsystems; motion, control, accelerometer and gyro and a host computer subsystem. The work principle of single-link robotics manipul

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Annuals Of Tropical Medicine & Public Health
Topical treatment of seborrhoeic dermatitis and dandruff: An overview
...Show More Authors

Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Characterization of Felodipine as an Oral Nanoemulsions
...Show More Authors

            Felodipine is a calcium-channel blocker with low aqueous solubility and bioavailability. Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE) is one of the popular methods that has been used to solve the dispersibility problems of many drugs. Felodipine was formulated as a NE utilizing oleic acid as an oil phase, tween 80 and tween 60 as surfactants and ethanol as a co-surfactant. Eight formulas were prepared, and different tests were performed to ensure the stability of the NEs, such as particle size, polydispersity index, zeta potential, dilution test, drug content, viscosity and in-vitro drug release. Result

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (7)
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Medical Sciences
Lower Gastrointestinal Bleeding: An Etiological Study.
...Show More Authors

Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Aesthetics Environmental Art (An analytical study)
...Show More Authors

Find cares studying the aesthetics of environmental art, one of the topics that is one of the problems of the aesthetic side in the arts of postmodernism, so this research came as an attempt to get to know the aesthetic concepts of environmental art that can be learned from functional testing in the formation of the post-modern control. The research involved four chapters: The first chapter discusses the general framework of the research methodology, as it was displayed in itThe research problem and its importance and define its objective to identify the aesthetics of environmental art at the level of the body, meaning, the receiver .ozlk in Iraq and America as the spatial limits of the time limits are period stretching from 1970 to 2006

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.